I am Stanley Egwuonwu from Salt Lake City Utah, I am currently a professor at Salt Lake Community College, and have been in Information Technology fields over 10 years now. I have worked for University of Utah as a Network Engineer, Dell EMC and RSA in different positions, my last position at RSA was Security engineer in their adaptive authentication group. I hold a Master’s degree in Information Systems, Security and Assurance from Western Governors University, and also obtained industry certifications in Computer Hacking Forensic Investigator (CHFI) and Ethical Hacking(CEH) from EC-Council. Anytime I am tired of playing with my toys (Computers and servers) I usually head over to a gun range. I love hunting and love to shoot different types
of gun. I will admit I love guns and own several of them myself. Recently in my state, most of our students at Salt Lake Community College transfer to a 4-year college and there has been a dispute between the 4-year college institutions and Salt Lake Community College about the academic qualification of our professors, it was then that I realized that a doctorate degree should be my next career goal. I think now is the right time for me to pursue doctorate degree based on the recent academic qualification in my school and because I have a lot of time in my hand as a professor, most of my classes are scheduled Mondays to Thursdays between 9am to 1pm. When I started my academic endeavor, I wanted to major in security but the university I attended does not have computer science degree in security, so when I finished my bachelors, I enrolled right away at Western Governors University into a dedicated Master’s degree in Cyber security. Obtaining a master’s degree in Information Security and Assurance opened so many doors for me and one of them was to teach at a community college in my state, where I help guide young minds to achieve their greatest potential in computer science. And also to contribute and advance ideas currently in use or in development by many talented security professionals around the world, which will hopefully, someday, make our cyber world a more secure place. I believe that obtaining a doctorate degree will help me in a lot of ways in my career, and most importantly to accomplish my career goals, whether I stay in academic world or move on to something else in security industry.
Azzam’s Publications is an online publication that is believed to be funded by Al Qaeda. This online publication conducted a global of jihadism by way of an internet access provider based in District of Connecticut (). This publication bolstered the push of hysterical jihadism and eulogize honor of suffering for the sake of a cause. Due to theses, many harsh publications led the law enforcement to further investigate Azzam’s Publication which former web page www. azzam.com; after further digging the trail led to the inquiry of one of the online publication’s coordinators, Babar Ahmad’s apartment that was located in London. During this search or seizure of evidence, authorities found a protected secret identification diskette that enclosed information of the USS Benfold journey, other warships security vulnerability, sent monetary, and many emails conversations with Abu-jihad which led to the indictment of Hassan Abu-jihad.
First, hunting can be a source of relaxation. Sitting in the woods with nobody else around, far from the routine life, can be very therapeutic. One’s life is hectic with all the demands of everyday living. Running away from them, and having a time for oneself can be very healthy.” Even If you don’t makea kill , you will benefit from the peace and quiet sounds of nature“(National Geographic News ,March,2007). Moreover, hunting is a good method to rid oneself of pent up anger. Emotions may build up, and anger might fill the mind; hun...
In todays fast pace world of technology many of us leave ourselves vulnerable to become victims of a cybercrime. With people using the internet to do everything from paying bills, personal banking, and on-line shopping their financial and personal information is available at the stroke of a key to a hacker. Often someone is unaware that they have been attacked and had their information stolen. The use of the internet has grown exorbitantly throughout the world. Nelson Online reported that as of December 31, 2014, there were 360,985,492 users of the internet throughout the world. (2015) With so many users in so many countries accessing the internet, prosecuting cybercrimes is nearly impossible.
One of the most important aspects of studying a history of a place is why that place came into existence in the first place. The FBI's Regional Computer Forensics Laboratories are perhaps not a terribly well-known entity within the general public, yet they play an essential part in both our justice system, and our everyday lives. So this begs the question, why would a laboratory centered strictly around computers, even more specifically the forensics around computers, come to be in an age where certainly all major government establishments have, and are familiar with, computers and the technology associated within them. These are a few of the questions that will be answered throughout this research paper, along with an analysis of where they are today, and where it appears the future of these labs will take them.
Abstract This paper discusses several implementations of modern technology in criminal investigations, and the ethical issues that accompany these techniques, focusing on the tradeoff between security and privacy. Specific topics include centralization of information, telecommunications, and general technology. Cases are cited for each topic, as well as a discussion of the ethical issues involved.
Businesses and government agencies are not the only targets for hackers, they do attack colleges and universities. There have been other higher education institutions which have been hacked and they have put in measures to try to prevent reoccurring hacking. There are processes, methodologies, and technology that can be purchased to lower the threats for computer crime. Laws have been put in place to protect universities, companies, government agencies, and other facilities, which are used to convict offenders. With the laws, there are government programs in place which can complement the security operations. When a crime has been committed, there are several times of tools that can be used for gathering electronic evidence such as evidence
Ethical hacking supports efforts to have more information about the organization’s system security so this helps to better the organization’s efforts to strengthen security measures against malicious hackers.
In conclusion, I believe that I have the required zeal to progress my knowledge further at the University of Southern California. My decision to focus on Cybersecurity over the years, has equipped me with a unique set of strengths that I can put to use in the program. Being an International student, I hope to contribute to the already existing multiethnic and multiracial society at your esteemed institution. After I earn my master's degree, I intend to start work on my Ph.D. in Computer Science. I see Ph. D as a professional stepping stone that would help me work in the area of research and development for the Government of India. It is in R & D that I believe, I can make the greatest contribution, utilizing my theoretical background and creativity as a scientist.
In my opinion, ethics give people free will to make right choices. People have free will to make choices that are governed with responsibility, accountability, and liability. We have a responsibility to perform in an ethical manner and be accountable for our choices or actions. Regardless of the circumstances and choices we make, there are consequences if we make the wrong choice. The question of whether an action or choice is ethical or not is fundamentally based on whether something is right or wrong. From an ethical standpoint, unethical choices and risky behavior can lead to increased liabilities. The liabilities result in the loss or damage sustained by a company or other party as result of an unethical and sometimes illegal decision. Although we exercise free will on a continuous basis, we are governed by the decisions we make and my belief is that the decisions we make daily do not just affect us. These decisions affect other people, such as family, friends, coworkers, instructors, neighbors, etc. The most prominent example of ethics can be recognized in the field of technology based on the growing amount of rapidly changing legislation and acts that under consideration in order to protect people from unethical practices.
Cyber forensics, also called digital forensics or computer forensics, is a quickly growing field as the world goes digital. This field involves gathering evidence and analysing this evidence from computers, servers and networks in a manner that is suitable to present in a court of law. As the internet grows in popularity, so does criminal activity over the internet. When the law catches a criminal that used a computer to commit a crime, they confiscate the computer and all related storage devices for cyber forensics experts to examine the device to find fraudulent activity.
The issue with tackling the ethical hacker scenario is that the event is almost entirely action based. There is no end to give meaning to the action and there is no finalized result or indication that it impacted happiness, which many ethical theories depend on. Namely consequentialism, utilitarianism and ethical egotism require an end result in one form or another. There is also no purpose in committing the hackings which makes applying moral theories that deal with motivation and intent, ethical egotism and aspects of virtue ethics, increasingly more difficult to do effectively. Therefore moral theories that apply almost exclusively to the action itself will be utilized in this argument.
This form of behavior has legal and ethical consequences if it is not dealt with in each instance. In order for “trust violators” to commit violations, rationalization, opportunity, and pressure need to be present. (Neiuwenboer & Kaptein, 2008) Falsifying reports or planting evidence is ethically unsound because every officer is required to swear an oath to office. It not only violates their oath but is in vio-lation of the laws of police conduct. Some question whether officers know at the time that they are taking the oath that if the situation presented itself, they would be willing to go against the laws they swore to uphold?
Harvey, Brian. A. Computer Hacking and Ethics. Ed. Paul Goodman, P.G., a.k.a. Electrical Engineering and Computer Science.
Millions of people around the world use computers and the internet every day. We all use it in school, work even at home, computers have made us life easier, it has brought so many benefits to the society but it has also brought some problems and cybercrimes is one of them. “The times have really changed,” said Greg Garcia, the department’s assistant secretary for cyber security and communications. “We’re seeing now phishing, farming, botnets … war dialing and domain server spoofing. And we’re seeing coordinated cyber-attacks against nation states.” (Fowler 5) Cybercrime is one of the most prevalent and most popular rising crimes being committed today. This is criminal activity done using computers and the Internet. There are millions victims around the world everyday who face these problems. Most people become victims of these at one time or another, but there are ways to avoid or deal with cybercrime by protecting yourself appropriately. I also was one of those victims who faced a similar problem. This unfortunate truth forces me to understand that computers and the Internet have made our lives easier in many ways. However, it is unfortunate that people also use these technologies to take advantage of others through identity theft, hacking attempts, and malicious use of software.
The advantages of technology and the internet have led more criminals to use cyberspace to commit crimes. The threat of cybercrime is increasing as globalization continues to spread across the world. While the impact of globalization has led to amazing, new discoveries throughout the world, Internet connectivity has also made cybercrime easier. America and the rest of the world have become more reliant on technology and use it in more aspects of their lives, technology-users make themselves more vulnerable to cyber attacks. Globalization and the growing use of computers in the world have given people a motive to learn more about computing and become more knowledgeable as programmers. As these people learn more, there is a risk that they will use their new intelligence to commit cybercrimes.